Secure use of passwords: Difference between revisions

From RavenWiki
Jump to navigationJump to search
(Created from original CS-internal version)
 
mNo edit summary
 
Line 13: Line 13:
These two can actually be combined: '''Passwords must not travel in clear over insecure networks ''or through any system that anyone doesn't trust'''''.
These two can actually be combined: '''Passwords must not travel in clear over insecure networks ''or through any system that anyone doesn't trust'''''.


==Perquisite 3==
==Prerequisite 3==


: '''It must be possible for password holders to decide when it is safe to divulge their password.''' They need to divulge their password to authenticate, but divulging it also makes it possible for others to impersonate them.  
: '''It must be possible for password holders to decide when it is safe to divulge their password.''' They need to divulge their password to authenticate, but divulging it also makes it possible for others to impersonate them.  

Latest revision as of 13:50, 24 July 2006

Passwords are about the best tool we have for identifying people on-line. There are alternatives, but they have financial and organisational costs that don't scale to 30,000 people. Unfortunatly passwords are actually a very poor tool for this purpose and there are a number of prerequisites that must be met if they are to work at all. Three related ones interest me in particular - one that many people understand, two that they don't.

Prerequisite 1

Passwords must not travel in clear over insecure networks. Many networks are relatively easy to snoop. Most wireless networks are trivial to snoop and doing so doesn't even need physical access. Anyone who manages to capture a userid and password by snooping can impersonate the user for as long as the userid/password pair remains valid, and may be able to leverage this to gain further privilege. Most people understand this.

Prerequisite 2

Passwords must not be divulged in clear to untrusted systems. It's no good having a secure central password validation service if third-party systems collect userids and passwords and pass them on to the central service. Any one of these systems could maliciously capture userids and passwords, or accidentally or recklessly expose them. Even if access to the central validation system is itself secure, a common failing of such third-parties is for them to cause or encourage passwords to be sent in clear on insecure networks.
Of course it's tempting to say "My system's secure so it's safe for me to do this". The problem is that, given n such systems it's necessary for them to trust the other n - 1. Clearly this doesn't scale much beyond n = 1.

These two can actually be combined: Passwords must not travel in clear over insecure networks or through any system that anyone doesn't trust.

Prerequisite 3

It must be possible for password holders to decide when it is safe to divulge their password. They need to divulge their password to authenticate, but divulging it also makes it possible for others to impersonate them.
A system that only ever requires a password to be entered on one particular secure form on one particular web site goes some way towards meeting this requirement. Even if many people don't understand the issues it is likely that at least some will, and will identify and report other occasions on which they are asked for this password. Such other requests are likely to be dangerous or malicious. As the number of occasions on which a particular password is legitimatly requested rises, so does the difficulty of explaining and understanding what these occasions are. Beyond a small number, most people will reflexively enter their password whenever they are asked for it. This will result in an increase in likelihood of malicious or accident password interception and so a decrease in the reliability of the authentication system.

Remember, when considering password-based authentication systems, that the important thing isn't that legitimate users get challenged for a password before gaining access, even though this is the behaviour commonly checked by management. The important thing is that people can not realistically gain access using an identity that is not their own, and this isn't the same thing!